Privacy

Related Projects

Related Topics

Privacy has become one of the defining issue of the Information Age. CIS has received national recognition for its interdisciplinary and multi-angle examination of privacy, particularly as it relates to emerging technology.

Albert Gidari is the Director of Privacy at the Stanford Center for Internet and Society. He was a partner for over 20 years at Perkins Coie LLP, achieving a top-ranking in privacy law by Chambers. He negotiated the first-ever "privacy by design" consent decree with the Federal Trade Commission on behalf of Google, which required the establishment of a comprehensive privacy program including third party compliance audits. Mr.

Jennifer Stisa Granick is the Director of Civil Liberties at the Stanford Center for Internet and Society. She is the author of a forthcoming book from Cambridge University Press entitled American Spies: Modern Surveillance, Why You Should Care, and What To Do About It. From 2001 to 2007, Granick was Executive Director of CIS and taught Cyberlaw, Computer Crime Law, Internet intermediary liability, and Internet law and policy. From 2007 to 2010 she served as the Civil Liberties Director at the Electronic Frontier Foundation.

Norberto Andrade is a Postdoctoral Research Fellow scholar at UC Berkeley School of Law, Berkeley Center for Law & Technology (BCLT), and a Fellow at the Hague Institute for the Internationalisation of Law (HiiL, The Netherlands). He has worked as a Scientific Officer at the Institute for Prospective Technological Studies (IPTS) of the European Commission’s Joint Research Centre, and as a legal expert in the field of telecommunications at the Portuguese Regulatory Authority for Communications (ANACOM).

Charles Belle is the founder and Executive Director of Startup Policy Lab, a new nonprofit think tank dedicated to connecting policymakers and the startup community. Examining public policy at the nexus of startups and technology, Charles' research is currently focused on privacy and how to support local government open data initiatives while simultaneously protecting citizen privacy.

Dan Geer – the Chief Information Security Officer at In-Q-Tel (the US Intelligence Community’s venture capital firm) and all-around-cyber-guru - recently gave a keynote speech to the Recorded Future RFUN 2015 conference entitled simply “Intelligence.” Like so many of Geer’s talk, it is flecked with wisdom, references to a broad mix of thinkers

On Friday, the President’s Commission on Enhancing National Cybersecurity published its final report, making 16 recommendations and identifying 53 action items to improve cybersecurity in the United States.

Palo Alto lawmakers have proposed legislation granting the community greater control over police surveillance — including the Police Department’s purchase and use of equipment such as drones, license plate readers and social media monitoring software. Palo Alto and 10 other cities around the country that have proposed similar laws are part of a movement to bring the community and elected representatives into decisions by local police to acquire such powerful and invasive surveillance technologies. We all should urge our own elected representatives to take similar steps.

As users of Twitter and many other services probably know, large parts of the Internet weren’t working Friday, thanks to a hacking attack on the Internet’s infrastructure. NBC reported that a senior intelligence official told the network that the hack “does not appear at this point to be any kind of state-sponsored or directed attack.” It may be that new evidence emerges that leads the U.S.

Pages

Arguing that a defendant’s conviction for website hacking should be overturned because legitimate, highly valuable security and privacy research commonly employs techniques that are essentially identical to what the defendant did and that such independent research is of great value to academics, government regulators and the public even when – often especially when — conducted without a website owner’s permission.

Arguing that the information publicly available on the NSA's Upstream program, combined with an understanding of how the Internet works, means plaintiff Wikimedia has met its burden of proving standing to challenge Upstream.

Arguing that if the court should not compel Apple to create software to enable unlocking and search of the San Bernardino shooter’s iPhone, it will jeopardize digital and personal security more generally.

"Facing increasingly sophisticated technology, the government has turned toward legalized hacking to defeat digital security measures, said Riana Pfefferkorn of the Stanford Center for Internet and Society. In order to catch pedophiles masking their identities using Tor, a program first built for the U.S.

"“Courts should be skeptical going forward when the government claims it has no other option besides compelling a device maker’s assistance,” said Riana Pfefferkorn, a cryptography fellow at the Stanford Center for Internet and Society.

“Now that the F.B.I. has accessed this iPhone, it should disclose the method for doing so to Apple,” she added. “Apple ought to have the chance to fix that security issue, which likely affects many other iPhones.”"

"“I think Apple will fight as hard as they can, but the moment the FBI withdraws the motion, Apple will have a difficult time finding anything out,” said Riana Pfefferkorn, a fellow at the Stanford Center for Internet and Society who filed an amicus ‘friend of the court’ brief in the case supporting Apple."

""By allowing pre-report viewing, statements from officers will always appear more accurate and more credible than other witnesses statements, which would unnecessarily tilt the justice system even further against criminal defendants," said Harlan Yu, a principal with technology consulting firm Upturn, which last yearcollaborated on a camera policy "scorecard" compiled by the Leadership Conference on Civil and Human Rights, which represents more than 200 national organizations.

Pages

Today, the debate over encryption is making headlines in nations around the world. Together, we’re working toward solutions at Crypto Summit 2.0.

The first Crypto Summit, held in July 2015 in Washington, D.C., brought together technologists, lawyers, and policy professionals from different sectors. Since then leading experts have considered proposals that would legislate the future of encryption — and the future of privacy and security online.

University of Maryland Professor of Law and author of the book “Hate Crimes in Cyberspace,” Danielle Citron provides a systematic account of online harassment, and the personal, economic, professional and social costs to its victims and society. Citron tackles the increasingly prevalent but often trivialized issues of cyber stalking and cyber bullying, helps us understand them and maps a course for how we can address them.

Pages

What's the latest in the FBI's ongoing dispute with Apple over encrypted iPhones? What's at stake and what could happen next? Guest Speaker, Riana Pfefferkorn is the Cryptography Fellow at the Stanford Center for Internet and Society.

Elizabeth Joh, a professor at the U-C Davis school of Law, and Don Aplin, a managing editor from Bloomberg BNA, discuss the constitutionality of increasing government surveillance across the United States. They also discuss a recent case in Seattle, where a judge ruled the city’s trash-check ordinance unconstitutional, which allowed trash collectors to check trash bags to make sure people were not sending compostable trash to landfills. They speak with Bloomberg Law host June Grasso on Bloomberg Radio’s "Bloomberg Law."